[{"name":"S3-241103","title":"New use case for security evaluation and monitoring: NFV vulnerabilities","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":120,"status":"noted","reservation_date":"2024-03-04 15:09:20","uploaded":"2024-04-03 15:22:38","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241103.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241104","title":"New use case for security evaluation and monitoring: API security risks","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":130,"status":"noted","reservation_date":"2024-03-04 15:10:18","uploaded":"2024-04-03 15:22:57","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241104.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241105","title":"New use case for security evaluation and monitoring: Man-in-the-Middle (MitM) attacks","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":140,"status":"noted","reservation_date":"2024-03-04 15:11:01","uploaded":"2024-04-03 15:23:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241105.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241106","title":"New use case for security evaluation and monitoring: Identity spoofing and impersonation (Aka Rogue Elements)","source":"Dell Technologies","contact":"Robert Sun","contact-id":99349,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":150,"status":"noted","reservation_date":"2024-03-04 15:11:41","uploaded":"2024-04-03 15:23:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241106.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241134","title":"FS_eZTS Offline Call#3 Minutes","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":260,"status":"noted","reservation_date":"2024-05-04 19:16:46","uploaded":"2024-04-08 14:22:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241134.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241135","title":"New KI on dynamic security policy enforcement","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":210,"status":"merged","reservation_date":"2024-05-04 19:17:19","uploaded":"2024-04-08 14:22:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241135.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241136","title":"Updates to KI#1","source":"Lenovo, Nokia, Nokia Shanghai Bell, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":190,"status":"merged","reservation_date":"2024-05-04 19:17:59","uploaded":"2024-04-08 14:22:32","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241136.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241137","title":"Updates to Access control decision enhancement usecase","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":180,"status":"approved","reservation_date":"2024-05-04 19:18:33","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241137.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241138","title":"Updates to Massive number of SBI messages","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":80,"status":"revised","reservation_date":"2024-05-04 19:19:17","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"S3-241568","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241138.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241139","title":"Updates to Malformed Message Usecase","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-05-04 19:21:13","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"S3-241570","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241139.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241140","title":"Resolving EN on dynamic security policy enforcement","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":30,"status":"merged","reservation_date":"2024-05-04 19:22:21","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241140.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241141","title":"Resolving EN on data exposure","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":20,"status":"merged","reservation_date":"2024-05-04 19:23:04","uploaded":"2024-04-08 14:22:31","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241141.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241154","title":"Resolve EN and provide updates to use case 3","source":"MITRE Corporation, US NSA, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #3 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":100,"status":"revised","reservation_date":"2024-07-04 17:26:03","uploaded":"2024-04-07 17:33:10","revisionof":"","revisedto":"S3-241537","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241154.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241155","title":"Resolve EN and provide updates to use case 4","source":"MITRE Corporation, US NSA, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #4 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":110,"status":"revised","reservation_date":"2024-07-04 17:28:08","uploaded":"2024-04-07 17:33:10","revisionof":"","revisedto":"S3-241538","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241155.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241156","title":"Abnormal SBI Call Flow","source":"US National Security Agency, MITRE Corporation, OTD_US","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":160,"status":"revised","reservation_date":"2024-07-04 19:53:40","uploaded":"2024-04-07 19:55:50","revisionof":"","revisedto":"S3-241604","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241156.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241320","title":"Data related to failed audience claim in the access token","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":170,"status":"merged","reservation_date":"2024-08-04 09:25:05","uploaded":"2024-04-08 13:00:13","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241320.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241339","title":"Evaluation for the use case on malformed messages","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":60,"status":"merged","reservation_date":"2024-08-04 09:25:06","uploaded":"2024-04-08 13:00:15","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241339.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241340","title":"Evaluation for the use case on number of messages","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":90,"status":"merged","reservation_date":"2024-08-04 09:25:06","uploaded":"2024-04-08 13:00:15","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241340.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241341","title":"Discussion on the exposure of security related data","source":"Huawei, HiSilicon","contact":"Ao Lei","contact-id":84307,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":10,"status":"noted","reservation_date":"2024-08-04 09:25:06","uploaded":"2024-04-08 13:00:15","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241341.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241421","title":"LS on security data management for continuous security monitoring","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":250,"status":"noted","reservation_date":"2024-08-04 11:14:59","uploaded":"2024-04-08 12:33:22","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA5","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241421.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241423","title":"Adding requirements to KI#1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":200,"status":"revised","reservation_date":"2024-08-04 11:21:09","uploaded":"2024-04-08 13:06:56","revisionof":"","revisedto":"S3-241525","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241423.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241424","title":"Adding Key Issue on WT2 \"Security mechanism for dynamic policy enforcement\"","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":220,"status":"revised","reservation_date":"2024-08-04 11:21:09","uploaded":"2024-04-08 13:06:57","revisionof":"","revisedto":"S3-241526","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241424.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241425","title":"Update of the security assumptions","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":40,"status":"revised","reservation_date":"2024-08-04 11:21:10","uploaded":"2024-04-08 13:06:57","revisionof":"","revisedto":"S3-241527","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241425.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241426","title":"Update on malformed messages in the 5G SBA","source":"Ericsson","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":70,"status":"merged","reservation_date":"2024-08-04 11:21:10","uploaded":"2024-04-08 13:06:56","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241426.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241437","title":"New Solution for Key Issue 1","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":240,"status":"noted","reservation_date":"2024-08-04 11:28:37","uploaded":"2024-04-08 12:33:49","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241437.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241445","title":"New Key Issue on data exposure relevant for network level attacks","source":"Nokia","contact":"Rakshesh P. Bhatt","contact-id":96811,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":230,"status":"noted","reservation_date":"2024-08-04 12:29:21","uploaded":"2024-04-08 12:35:52","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241445.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241525","title":"Adding requirements to KI#1 \"Data exposure for security evaluation and monitoring\"","source":"Ericsson, Lenovo, Nokia, Nokia Shanghai Bell, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15250,"status":"approved","reservation_date":"2024-04-19 12:38:51","uploaded":"2024-04-19 14:50:14","revisionof":"S3-241423","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241525.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241526","title":"Adding Key Issue on WT2 \"Security mechanism for dynamic policy enforcement\"","source":"Ericsson, Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15260,"status":"approved","reservation_date":"2024-04-19 12:40:15","uploaded":"2024-04-19 14:50:14","revisionof":"S3-241424","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241526.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241527","title":"Update of the security assumptions","source":"Ericsson, Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility","contact":"Vlasios Tsiatsis","contact-id":76181,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15270,"status":"approved","reservation_date":"2024-04-19 12:41:41","uploaded":"2024-04-19 14:50:14","revisionof":"S3-241425","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241527.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241537","title":"Resolve EN and provide updates to use case 3","source":"MITRE Corporation, US NSA, Lenovo, Huawei, HiSilicon","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #3 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15370,"status":"approved","reservation_date":"2024-04-19 13:42:48","uploaded":"2024-04-19 14:26:46","revisionof":"S3-241154","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241537.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241538","title":"Resolve EN and provide updates to use case 4","source":"MITRE Corporation, US NSA, Lenovo","contact":"David Gabay","contact-id":90111,"tdoctype":"pCR","for":"Approval","abstract":"Provides updates to TR 33.794 use case #4 and resolves EN","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15380,"status":"approved","reservation_date":"2024-04-19 13:43:17","uploaded":"2024-04-19 14:26:46","revisionof":"S3-241155","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241538.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241568","title":"Updates to Massive number of SBI messages","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility, Huawei, HiSilicon","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15680,"status":"approved","reservation_date":"2024-04-19 14:40:12","uploaded":"2024-04-19 15:05:55","revisionof":"S3-241138","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241568.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241570","title":"Updates to Malformed Message Usecase","source":"Lenovo, MITRE Corporation, OTD_US, Johns Hopkins APL, Motorola Mobility, Ericsson, Huawei, HiSilicon","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":15700,"status":"approved","reservation_date":"2024-04-19 14:41:53","uploaded":"2024-04-19 15:05:55","revisionof":"S3-241139","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241570.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241604","title":"Abnormal SBI Call Flow","source":"US National Security Agency, MITRE Corporation, OTD_US","contact":"Martin Goldberg","contact-id":90654,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":16040,"status":"approved","reservation_date":"2024-04-21 02:38:34","uploaded":"2024-04-21 02:47:29","revisionof":"S3-241156","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.1.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241604.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241638","title":"Draft TR 33.794","source":"Lenovo, Motorola Mobility","contact":"Sheeba Backia Mary Baskaran","contact-id":86031,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"5.1","ainame":"Study on enablers for Zero Trust Security","tdoc_agenda_sort_order":16380,"status":"approved","reservation_date":"2024-04-22 08:36:18","uploaded":"2024-04-25 14:23:46","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.794","crspecversion":"0.2.0","workitem":[{"winame":"FS_eZTS"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241638.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]